Share

Related Links

  • IT Harvest
  • Reed Exhibitions Ltd is not responsible for the content of external websites.

Top 5 Stories

News

'Jester' ex-military hacker takes the distributed out of DDOS attacks

11 January 2010

A politically-motivated hacker has apparently developed a multi-thread, thin-client denial of service attack application that effectively allows him to launch a distributed denial of service (DDOS) attack on a website from a single linux server.

Whilst single point denial of service software has been available in the hacker domain for some time, its usage has been restricted to relatively high-powered computers with T1 or better upload speeds, Infosecurity notes. According to online reports, however, a patriotic Islamic hacker — with possible military connections — and with the moniker of `Jester' on Twitter has been creating denial of service attacks on a number of sites he associates with al-Qaeda and Jihadist terrorists.

What is interesting about the attack vectors used is that the attacks are reportedly being made through the Anonine.com Swedish IP anonymiser service, which offers users high levels of anonymity in return for a modest monthly payment.

Unlike many other anonymiser services, Anonine does not impose IP traffic limitations, which appears to allow the Jester the ability to open up multiple IP sessions across a single internet connection.

According to Richard Steinon, a senior analyst with IT Harvest, the hacker has been documenting his attacks against a number of sites including www.alemarah.info, www.radicalislam.org, islamicpoint.net, www.almaghrib.org, www.as-ansar.com, www.islamicnetwork.com, www.islamicawakening.com, and www.ansarnet.info, since the start of the year.

Last Thursday, Steinon said that the Jester has posted a message that the Presidential website of Iran (www.president.ir) was going to be unavailable for the next 40 minutes, due to the country's oppressive Islamic regime.

"I approached The Jester through (direct messaging on Twitter) and provided my email address. I wanted to understand his/her motivations and intentions. These are still not completely clear but this post sums it up — the Jester Tweets; the Jester is taking on radical Islam through the web," he said in an online report.

Steinon also got a response via email from the Jester:

Hi again Richard,

Forgive me if I may sound vague on any of the following, as you can probably understand I need to protect my own identity for the moment.

I am an ex-soldier with a rather famous unit, country purposely not specified. I was involved with supporting Special Forces, I have served in (and around) Afghanistan amongst other places. Since `leaving' the governments payroll, it has occurred to me that the bad-guys are in fact starting to utilise the web more and more as a recruitment, communication, and propaganda medium.

I have been and continue to develop methods and tools to disrupt, mis-inform and obstruct this kind of terrorist activity. Kinda like taking them down from the inside, and using my weapon of choice. The method I have used to take-down the sites mentioned on twitter is rather special, it's only downfall right now is that it is obviously only temporary disruption. But I can however take down and put back their sites at will. The attack is like a DDOS attack, except without the first.

There is nothing 'distributed' about this. It is possible with very low bandwidth and a single low-spec linux machine. I am still refining the tool, but if you check right now — www.alemarah.info is in fact temporarily down, until I decide to bring it back.

According to the Jester, he is not defacing websites, a practice he denounces as mere graffiti, but wants to demonstrate a denial of service attack system he claims works over layer 7 of the internet and which runs from a linux server.

This article is featured in:
Application Security  •  Internet and Network Security

 

Comments

sniper says:

17 January 2010
Good job jester

Note: The majority of comments posted are created by members of the public. The views expressed are theirs and unless specifically stated are not those Elsevier Ltd. We are not responsible for any content posted by members of the public or content of any third party sites that are accessible through this site. Any links to third party websites from this website do not amount to any endorsement of that site by the Elsevier Ltd and any use of that site by you is at your own risk. For further information, please refer to our Terms & Conditions.

Comment on this article

You must be registered and logged in to leave a comment about this article.

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies. ×